Module 22: Multi-core Computing Security
  Lecture 43: Multiprocessor Techniques
 


Goals: Confidentiality

  • Access to information or resources only to authorized users/entities/persons.
  • Mechanism:
    • Access Control List (ACL) or Access control specifications
    • Data encryption
  • Must have a mechanism to authenticate
    • Password, Cryptographic techniques
  • Some time necessary to even conceal the fact that the information exist.
    • Access control on directories, Steganography

Goals: Integrity

  • “Can I trust the information?”
  • Data integrity to ensure that the data is genuine and is not modified
  • Some time need to ensure that data originated from the right place
    • Origin integrity
  • Mechanism
    • Cryptographic techniques
    • Hashing techniques
    • Checksums and use of alternate channels to send them.